\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/editorial-guidelines\">Editorial Guidelines\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/security-group\">Security Group\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://clearseasresearch.com/\">Market Research\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"e8m-hf13_rw","content":{"text":"\u003cp >\u003cstrong >WANT MORE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/newsletters\">Newsletters\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/connect\">Connect\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/partners\">Partners\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ewifhjATNS4","content":{"linkText":"SUBSCRIBE TODAY!","children":[],"link":{"mode":2,"href":"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription","target":true}},"type":"w3tbowgsq-","cl":"w3tbowgsq- pWabAOUihi"},{"key":"ecRt8AVSZpt","content":{"text":"\u003ch1 >Get our new eMagazine delivered to your inbox every month.\u003c/h1>\u003cp >Stay in the know on the latest enterprise risk and security industry trends.\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"epJeXHHMOwb","content":{"text":"\u003cp >\u003cstrong >eMAGAZINE\u003cbr />\u003c/strong>\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://www.securitymagazine.com/contactus\">Contact Us\u003c/a>\u003cbr />\u003ca rel=\"noopener external\" href=\"https://www.securitymagazine.com/advertise\" target=\"_blank\">Advertise\u003c/a>\u003cbr />\u003ca target=\"_blank\" rel=\"noopener external\" href=\"https://bnp.dragonforms.com/loading.do?omedasite=SECeMagazineSubscription\">Subscribe\u003c/a>\u003c/p>","children":[]},"type":"text","cl":"text pga16ElKd_"},{"key":"ejsR_C7F7zP","content":{"text":"\u003cp >\u003cstrong >CONNECT WITH US\u003c/strong>\u003c/p>","children":[]},"type":"text","cl":"text pd3XDPpkiFS"},{"key":"ev86crc_9yg","content":{"children":[],"link":{"mode":2,"href":"https://www.linkedin.com/company/security-magazine/","target":true}},"type":"external-link","cl":"external-link"},{"key":"eziPieIV_b2","content":{"src":{"key":"Wiy0SNYyh","url":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","ratio":1.332},"children":[]},"type":"image","actions":["ev86crc_9yg"],"cl":"image"},{"key":"eaM12KrlHzr","content":{"children":[],"link":{"mode":2,"href":"https://twitter.com/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e5XmSU_NgAt","content":{"shapeId":"zyVGqzQPIb","children":[]},"type":"shape","actions":["eaM12KrlHzr"],"cl":"shape"},{"key":"eB07s1draqQ","content":{"children":[],"link":{"mode":2,"href":"https://www.facebook.com/SECmagazine","target":true}},"type":"external-link","cl":"external-link"},{"key":"ebvPu78QYll","content":{"shapeId":"erJql7HjU","children":[]},"type":"shape","actions":["eB07s1draqQ"],"cl":"shape"},{"key":"e2Himsg6Ild","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/media/podcasts/2594","target":true}},"type":"external-link","cl":"external-link"},{"key":"eKybKBPdwhO","content":{"shapeId":"nxWVNnWZm","children":[]},"type":"shape","actions":["e2Himsg6Ild"],"cl":"shape"},{"key":"ecUnYGt6e3a","content":{"children":[],"link":{"mode":2,"href":"https://www.youtube.com/user/SecurityMag","target":true}},"type":"external-link","cl":"external-link"},{"key":"e60ijU3hHgt","content":{"shapeId":"Z5l6xzNGx","children":[]},"type":"shape","actions":["ecUnYGt6e3a"],"cl":"shape"},{"key":"erhqIsFuHdD","content":{"children":[]},"type":"section","children":["eV87aINDMVk","e2nN7edE7gO","e8m-hf13_rw","ewifhjATNS4","ecRt8AVSZpt","epJeXHHMOwb","ejsR_C7F7zP","eziPieIV_b2","e5XmSU_NgAt","ebvPu78QYll","eKybKBPdwhO","e60ijU3hHgt"],"cl":"section"},{"key":"erXjEsRW98p","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"eeaN7ordAi7","content":{"children":[],"link":{"mode":2}},"type":"external-link","cl":"external-link"},{"key":"ex04RhaVMyC","content":{"children":[],"link":{"mode":2,"href":"https://www.securitymagazine.com/","target":true}},"type":"external-link","cl":"external-link"},{"key":"epeBdQKKVzl","content":{"src":{"key":"pwAptEAolq","url":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","ratio":null},"children":[]},"type":"image","actions":["erXjEsRW98p","eeaN7ordAi7","ex04RhaVMyC"],"cl":"image"},{"key":"eOUW2tYEpwT","content":{"children":[]},"type":"section","children":["epeBdQKKVzl"],"cl":"section"},{"key":"fixed","visibility":{"eaHl5lW8NJH":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"e6Qifq_f1Q1":{"pdtsTXzV7k2":true},"eOUW2tYEpwT":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"},"ePmVNIqEDiw":true,"erhqIsFuHdD":{"pbD0ClsolXt":"footer","pNFsGCQa62K":"footer","pHCw1LUkxdr":"footer","pA6fb3cLaEX":"footer","pgYyu51DpDu":"footer","pfmwYKNSI7D":"footer","ppXUUqUUpJq":"footer","pYsrWx1YYeR":"footer","pq9KKALvWYR":"footer","pZv7-zzNSwm":"footer","p0Un1ptPaNV":"footer","pMELwnu8xCJ":"footer","pTJuh0Rd2Sw":"footer","pdtsTXzV7k2":"footer","pNWtXEzudgY":"footer","paZpOzXFjLT":"footer","psCrsl1SoLZ":"footer","p8WveKGyZJO":"footer","pA6A7KqP4KF":"footer"}},"children":["ePmVNIqEDiw","e6Qifq_f1Q1","eaHl5lW8NJH","erhqIsFuHdD","eOUW2tYEpwT"]}],"pages":[{"key":"p0Un1ptPaNV","title":"Online Contents","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/jLpwsGgLK6.png","path":"online-contents"},{"key":"p6k2_T8fk4E","title":"AD–House Continuing Education","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/5LO3mhLwW9.png","path":"ad-house-continuing-education"},{"key":"p7XQXvzk8a1","title":"AD–House Brivo Infocenter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wq0FsUX2mF.png","path":"ad-house-brivo-infocenter"},{"key":"p8WveKGyZJO","title":"Detecting & Managing Fraud-Feature","desc":"Using lessons from across physical security and cybersecurity fraud prevention can help security professionals build robust anti-fraud programs.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/bC4cCYGsqO.jpg","path":"detecting-managing-fraud-feature"},{"key":"p8asxhNC7Js","title":"AD–House Security eNewsletter","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/P32kQ0Hgau.jpg","path":"ad-house-security-enewsletter"},{"key":"pA6A7KqP4KF","title":"Global News & Analysis-Department","desc":"Common targets of cyberattacks in Q2 2023; security leaders’ role in ensuring public health.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/IHgFM_eTPv.jpg","path":"global-news-analysis-department"},{"key":"pA6fb3cLaEX","title":"Advertising Index","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/vGHEbg2_qE.jpg","path":"advertising-index"},{"key":"pHCw1LUkxdr","title":"Classifieds","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGep9fE4F-.jpg","path":"classifieds"},{"key":"pLiUkAr0Yeq","title":"AD–xxx","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pLiUkAr0Yeq/v/0.jpg","path":"ad-xxx"},{"key":"pMELwnu8xCJ","title":"Staff Listing","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/XNBrVQ35MV.jpg","path":"staff-listing"},{"key":"pNFsGCQa62K","title":"Product Spotlight-Department","desc":"Security magazine highlights emergency and mass communications products for schools, organizations and government systems.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/yZro4OBKqv.jpg","path":"product-spotlight-department"},{"key":"pNWtXEzudgY","title":"Education & Training-Column","desc":"The prevalence of active shooter incidents have forced security leaders to rethink their physical security strategies. ","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","path":"education-training-column"},{"key":"pOCZ798jl3P","title":"AD–Amarok","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/tj83G6k2p2.png","path":"ad-amarok"},{"key":"pTJuh0Rd2Sw","title":"Career Intelligence-Column","desc":"Security job openings attract competition from private sector and public sector candidates. What qualities make a successful security leader?","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/wHEPuVOtCW.jpg","path":"career-intelligence-column"},{"key":"pUSxmAYzmov","title":"AD–Mobile Comm. America","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/T1IRZlrL9t.png","path":"ad-mobile-comm-america"},{"key":"pYsrWx1YYeR","title":"Leadership & Management-Column","desc":"Don’t get “ghosted” — being communicative during the job search process is critical for both the security job seeker and the hiring organization.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","path":"leadership-management-column"},{"key":"pZv7-zzNSwm","title":"Security Talk-Column","desc":"Discover insights from security executives for proving value & developing partnerships across your organization excerpted from our Solutions by Sector webinars.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QpEUg1GwPh.jpg","path":"security-talk-column"},{"key":"pa7NAZPkku9","title":"AD–House Solutions by Sector","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/GcnS_1ucs6.png","path":"ad–house-solutions-by-sector"},{"key":"paZpOzXFjLT","title":"Perimeter Security-Feature","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QB_keqBPAK.jpg","path":"perimeter-security-feature"},{"key":"pbD0ClsolXt","title":"eMagazine Navigation Guide","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Bl4vtdS6Dw.jpg","path":"emagazine-navigation-guide"},{"key":"pb_IsFqwtDI","title":"AD–House Security Bookstore","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zVFe8WHFh5.jpg","path":"ad-house-security-bookstore"},{"key":"pdtsTXzV7k2","title":"Strategic Security Management-Special Report","desc":"Security leaders discuss strategies to create effective security programs that communicate across the security organization and the enterprise at large.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/eb259J_VQa.jpg","path":"strategic-security-management-special-report"},{"key":"pfmwYKNSI7D","title":"xxxxxx-Column","desc":"","cover":"undefined/image/social/CsCc_Vzmcp/pfmwYKNSI7D/v/0.jpg","path":"xxxxxx-column"},{"key":"pgYyu51DpDu","title":"Security Program Design Part 2-Feature","desc":"In part two of the Security Program Design series, security leader J. Nicole McDargh breaks down the steps to developing an effective security program.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","path":"security-program-design-part-2-feature"},{"key":"ph3hWHT8xZ-","title":"AD–House Security 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NB1SostqQt.png","path":"adhouse-security-500-copy"},{"key":"pjqnARLIdYv","title":"AD–Webinar Axis","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/snDssQDUU4.png","path":"ad-webinar-axis"},{"key":"pkYFnV0JOoL","title":"AD–DKS","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/CRFWW9Du2W.png","path":"ad-dks"},{"key":"pmNBbUhVfqz","title":"AD–Altronix","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/lzkGTppKVP.png","path":"ad-altronix"},{"key":"po-qAutG259","title":"AD–House Refer a Friend","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/SGPllfMPLq.png","path":"ad-house-refer-a-friend"},{"key":"ppXUUqUUpJq","title":"Cyber Tactics-Column","desc":"Balancing the risks and benefits of artificial intelligence (AI) is critical to enterprise cybersecurity success going forward.","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/o0aU82VmqZ.jpg","path":"cyber-tactics-column"},{"key":"pq9KKALvWYR","title":"Classifieds Control Command Ad","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/NWQAhx5eSl.jpg","path":"classifieds-control-command-ad-copy"},{"key":"psCrsl1SoLZ","title":"Table of Contents","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/liAADRz1V_.jpg","path":"table-of-contents"},{"key":"psbWc2vDyc4","title":"Security October 2023","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","path":"","index":true},{"key":"pvjXdec9SnY","title":"AD–House Security Renewal","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Q5l1i3GeZp.jpg","path":"ad-house-security-renewal"},{"key":"pyiCHi_3RXD","title":"AD–Mission 500","desc":"","cover":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=628,w=1200,fit=crop/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/F41buUXgWJ.jpg","path":"ad-mission-500"}],"shapes":{"3m9Hfk7mIq":[576,512,"M570.24 247.41L323.87 45a56.06 56.06 0 0 0-71.74 0L5.76 247.41a16 16 0 0 0-2 22.54L14 282.25a16 16 0 0 0 22.53 2L64 261.69V448a32.09 32.09 0 0 0 32 32h128a32.09 32.09 0 0 0 32-32V344h64v104a32.09 32.09 0 0 0 32 32h128a32.07 32.07 0 0 0 32-31.76V261.67l27.53 22.62a16 16 0 0 0 22.53-2L572.29 270a16 16 0 0 0-2.05-22.59zM463.85 432H368V328a32.09 32.09 0 0 0-32-32h-96a32.09 32.09 0 0 0-32 32v104h-96V222.27L288 77.65l176 144.56z"],"TkPOoAgtCj":[384,512,"M356.683 255.576L115.915 18.636C77.055-21.086 8 6.909 8 62.87v349.112c0 55.241 67.457 83.887 107.414 44.727l23.927-23.449 17.535 40.669.121.281.125.274c13.903 31.145 50.295 45.894 82.155 32.648l41.903-17.395.254-.106.253-.109c15.618-6.697 27.662-19.038 33.912-34.749 6.184-15.545 5.927-32.568-.724-47.933l-18.71-43.423h16.527c55.848.002 85.165-68.485 43.991-107.841zm-43.872 59.843h-89.594l47.607 110.491c3.316 7.661-.474 16.249-8.053 19.499l-41.922 17.409c-7.816 3.25-16.58-.465-19.895-7.892l-45.238-104.92-73.898 72.423C72.038 432.012 56 424.734 56 411.982V62.868c0-13.309 16.978-19.829 25.817-10.445L323.47 290.117c9.79 9.091 2.553 25.302-10.659 25.302z"],"Z5l6xzNGx":[176,124,"M172,19A22,22,0,0,0,157,4C143,0,88,0,88,0S33,0,19,4A22,22,0,0,0,4,19C0,33,0,62,0,62S0,91,4,105A22,22,0,0,0,19,120C33,124,88,124,88,124S143,124,157,120A22,22,0,0,0,172,105C176,91,176,62,176,62S176,33,172,19zM70,88V36L116,62z"],"erJql7HjU":[1024,1024,"M1024,512C1024,229,795,0,512,0S0,229,0,512C0,768,187,979,432,1018V660H302V512H432V399C432,271,508,200,625,200C681,200,740,210,740,210V336H675C612,336,592,375,592,416V512H734L711,660H592V1018C837,979,1024,768,1024,512z"],"nxWVNnWZm":[400,400,"M154,302C248,302,300,223,300,156Q300,296,299,149A104,104,0,0,0,325,122A102,102,0,0,1,296,131A52,52,0,0,0,318,102A103,103,0,0,1,286,115A51,51,0,0,0,198,161A146,146,0,0,1,92,108A51,51,0,0,0,108,176A51,51,0,0,1,85,170C85,170,85,170,85,171A51,51,0,0,0,126,221A51,51,0,0,1,103,222A51,51,0,0,0,151,257A103,103,0,0,1,87,279A105,105,0,0,1,75,279A145,145,0,0,0,154,302M0,0H400V400H0z"],"zyVGqzQPIb":[1200,1227,"M714.20,519.30L1160.90,0H1055.00L667.10,450.90L357.30,0H0L468.50,681.80L0,1226.40H105.90L515.50,750.20L842.70,1226.40H1200.00L714.20,519.30V519.30zM569.20,687.80L521.70,619.90L144.00,79.70H306.60L611.40,515.70L658.90,583.60L1055.10,1150.30H892.50L569.20,687.80V687.80z"]},"images":{"-7tRSafPFG":{"meta":{"width":244,"description":"AXIS","photographer":"Courtesy of AXIS","height":91},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/-7tRSafPFG/2100.jpg","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/-7tRSafPFG/2100.jpg",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/-7tRSafPFG/2100.jpg",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/-7tRSafPFG/2100.jpg",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/-7tRSafPFG/2100.jpg",2100]]},"-SzwYB65N8":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/-SzwYB65N8.svg","srcset":[]},"DV4GqloqRV":{"meta":{"width":4216,"height":2525,"description":"Fixture, Wood, Hall, Lighting, Floor, Flooring, Building"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/DV4GqloqRV.jpg",2560]]},"HQ_k6Mhqsc":{"meta":{"description":"Facebook"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/HQ_k6Mhqsc.svg","srcset":[]},"J5c71W7xk9":{"meta":{"description":"LinkedIn"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/J5c71W7xk9.svg","srcset":[]},"Ji0ZrPzlFT":{"meta":{"description":"More Inside"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/Ji0ZrPzlFT.svg","srcset":[]},"N-oYghXkN4":{"meta":{"width":1200,"height":1600,"description":"Font, Line"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/N-oYghXkN4.jpg",1600]]},"PB1uHA6sLo":{"meta":{"width":7304,"height":3395,"description":"Dress shirt, Sleeve, Gesture, Collar, Cap"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PB1uHA6sLo.jpg",2560]]},"PZDerRPxMS":{"meta":{"width":7254,"height":4576,"description":"Post-it note, Handwriting, Community"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/PZDerRPxMS.jpg",2560]]},"QJkq3PpIWg":{"meta":{"width":7304,"height":3830,"description":"Dress shirt, Military person, Podium, Security, Microphone, Gesture"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/QJkq3PpIWg.jpg",2560]]},"Wiy0SNYyh":{"meta":{"description":"Rectangle, Font, Line, White, Text"},"src":"https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png","srcset":[["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",500],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1080],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",1600],["https://cdn.vev.design/private/TrZjorIyzFVHDIUpGHunL0PSQdM2/images/Wiy0SNYyh/2100.png",2100]]},"_Oa29GoFdc":{"meta":{"width":3236,"height":6200,"description":"Dress shirt, Flash photography, Sleeve, Tie, Gesture, Collar"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,h=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/_Oa29GoFdc.jpg",2560]]},"aysIzO3F2e":{"meta":{"description":"YouTube"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/aysIzO3F2e.svg","srcset":[]},"hQIY-kykT_":{"meta":{"width":5022,"height":2825,"description":"Input device, Electronic instrument, Blue, Peripheral, Azure, Watch, Gadget, Water, Font"},"src":"https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1920/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg","srcset":[["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=320/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",320],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=640/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",640],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=960/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",960],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=1280/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",1280],["https://cdn.vev.design/cdn-cgi/image/f=auto,q=82,w=2560/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/hQIY-kykT_.jpg",2560]]},"kxP0ivw3WS":{"meta":{"description":"Security"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/kxP0ivw3WS.svg","srcset":[]},"neBCU9qY7X":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/neBCU9qY7X.svg","srcset":[]},"pfvf-TqzTJ":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/pfvf-TqzTJ.svg","srcset":[]},"pwAptEAolq":{"meta":{"description":"SEC Logo","photographer":""},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/pwAptEAolq.svg","srcset":[]},"vNWK15VOrT":{"meta":{"width":469,"description":"Security eMagazines","photographer":"","height":149},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png","srcset":[["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",500],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1080],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",1600],["https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/images/vNWK15VOrT/2100.png",2100]]},"xo4kNCmnnF":{"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/xo4kNCmnnF.svg","srcset":[]},"zs5IvRmRvu":{"meta":{"description":"Podcasts"},"src":"https://cdn.vev.design/private/X093X2c4FGP3vBOJj7tcc5k7CRJ2/image/zs5IvRmRvu.svg","srcset":[]}},"interactions":[],"pkg":{"section":"basic","image":"basic","w1br1l0lsu-u06":"pgxSSDpDPRe","text":"basic","rectangle":"basic","w3tbowgsq-":"pMdFOsZW1t","external-link":"basic","w1bn5r0s80-1477":"p8vPJJ1MbCI","frame":"basic","w1bopak0jo-n2r":"pgxSSDpDPRe","w1cal72054-hh4":"pL-YXwgdPSb8","shape":"basic","wl9gVIiyFe":"p7bqre2y","w7Ty9ifjBD":"pEIMfUpQ6oy","whFspJafhvC":"enfxfhXZ-6"},"menus":{"2AFExsrzKI":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"S_GjtjOvU5"}],"title":"Main menu","key":"2AFExsrzKI"},"47z-py6iT4":{"children":[{"children":[],"link":{"mode":0},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0},"title":"Feature 1","key":"GXDOHhgEKz"},{"link":{"mode":0},"title":"Feature 2","key":"pGEfn4L7RE"},{"link":{"mode":0},"title":"Feature 3","key":"wPx5EfFb3r"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0},"title":"Classified Advertising","key":"VW3qhvU-7R"},{"link":{"mode":0},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0},"title":"e-Mag Navigation Help","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"title":"Main menu BACKUP","key":"47z-py6iT4"},"HRIdsyZs5N":{"title":"Download - Back Issue MENU","children":[{"link":{"mode":2,"href":"https://www.dropbox.com/scl/fi/guxiimdiymfzkip82pxbh/SEC_Oct-2023_Full-Issue.pdf?rlkey=owvm2jdlph5hslz3nocdtqdnl&dl=1"},"title":"DOWNLOAD ISSUE","key":"jQbV7bSYYU"},{"link":{"mode":2,"href":"https://www.securitymagazine.com/emagazine","target":true},"title":"BACK ISSUES","key":"aqbQM92Zid"}],"key":"HRIdsyZs5N"},"VKOOSIUEfw":{"children":[{"children":[],"link":{"mode":0},"title":"Most Influential 2022 Intro","key":"VQJnkJ6EyX"},{"link":{"mode":0},"title":"Erik Antons","key":"b1sOrWTWb8"},{"children":[],"link":{"mode":0},"title":"Wendy Bashnan","key":"8X9x83O40O"},{"link":{"mode":0},"title":"Lauren Bean Buitta","key":"2ztDiDh787"},{"children":[],"link":{"mode":0},"title":"Julie Bowen","key":"NKQCi5jV9M"},{"link":{"mode":0},"title":"Sandi Davies","key":"d9y8ElGbL1"},{"link":{"mode":0},"title":"Shannon Furiel-Mureithi","key":"mhdk32fUBV"},{"link":{"mode":0},"title":"Michael Garcia","key":"xpkcxctb5R"},{"link":{"mode":0},"title":"Martin Gill","key":"6NX6Fe_yws"},{"link":{"mode":0},"title":"Peter Hunt","key":"u9IT0g89eg"},{"link":{"mode":0},"title":"Allan Moore","key":"DwlAZ1m7Lh"},{"link":{"mode":0},"title":"Andree Rose","key":"d47fYs77Rj"},{"link":{"mode":0},"title":"Gordon Snow","key":"5lp_KwYaiJ"}],"title":"Special Report MIP NAV MENU","key":"VKOOSIUEfw"},"fSPzLGr8R5":{"children":[{"link":{"mode":0},"title":"Untitled menu item","key":"VE4WOfGkln"}],"title":"Main menu","key":"fSPzLGr8R5"},"qJf6gzO8js":{"title":"Main menu GOLD & SLIDE OUT","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"HOME","key":"Lpne3xBspf"},{"children":[{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"sQJ5qGukgg"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"ugl7QbFbJv"}],"link":{"mode":0},"title":"CONTENTS","key":"FpibzECdPl"},{"children":[{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management","key":"GXDOHhgEKz"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud","key":"pGEfn4L7RE"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security","key":"wPx5EfFb3r"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2","key":"3W6fnCOrUF"}],"link":{"mode":0},"title":"FEATURES","key":"Mh4pGESMgS"},{"children":[{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk","key":"6CW_f3oUfx"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence","key":"L-KT0nqvlV"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management","key":"dR6fC7jnNA"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics","key":"Is3xAIhp6c"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training","key":"Sm_9AxufJm"}],"link":{"mode":0},"title":"COLUMNS","key":"1Tu3X6nD2A"},{"children":[{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis","key":"mVQwty_39V"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight","key":"w-Pq7522y8"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"VW3qhvU-7R"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"udGJj2ySM8"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"hygO01XxWI"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"4CFpeEkHtz"}],"link":{"mode":0},"title":"DEPARTMENTS","key":"k0uY0x86Ay"}],"key":"qJf6gzO8js"},"qvTd3DBOll":{"children":[{"children":[{"link":{"mode":0},"title":"Introduction","key":"Z7xZuyKk92"},{"link":{"mode":0},"title":"Methodology","key":"ZWyHOIbrf4"}],"link":{"mode":0},"title":"2022 BENCHMARK HOME","key":"R2OsbLCqqT"},{"children":[{"link":{"mode":0},"title":"Security Roles & Responsibilities","key":"2Bb_AqdORZ"},{"link":{"mode":0},"title":"Security Budgets, Spending & More","key":"8Ah_s0wvbw"},{"link":{"mode":0},"title":"Security Guarding & Operations","key":"znGKUx5xTx"},{"link":{"mode":0},"title":"Security-Related Training & Technology","key":"0utBwTPccG"},{"link":{"mode":0},"title":"Security Teams Using Metrics","key":"muqwU7Sd4A"}],"link":{"mode":0},"title":"MAIN REPORTS","key":"up_zO2a1pV"},{"children":[{"link":{"mode":0},"title":"Aerospace & Defense","key":"NBX0EZFvrT"},{"link":{"mode":0},"title":"Agriculture, Food & Beverage, Construction","key":"qo-NvFWI0k"},{"link":{"mode":0},"title":"Banking & Insurance","key":"yQtb8JhhM3"},{"link":{"mode":0},"title":"Business Services & Consulting","key":"A2wGizzyyl"},{"link":{"mode":0},"title":"Entertainment & Cultural Institutions","key":"B6xBXx9ru8"},{"link":{"mode":0},"title":"Healthcare","key":"LRoTbpz5rC"},{"link":{"mode":0},"title":"Higher Education","key":"xzaRK-Ngm1"},{"link":{"mode":0},"title":"Information Technology & Media","key":"GrbMIDMorh"},{"link":{"mode":0},"title":"Manufacturing","key":"g3vFYWNnsJ"},{"link":{"mode":0},"title":"Pharma & Biotech","key":"QcZp6-fEVv"}],"link":{"mode":0},"title":"SECTOR REPORTS","key":"AATLS-kOea"},{"children":[{"link":{"mode":0},"title":"Training","key":"rJQwl09FS5"},{"link":{"mode":0},"title":"DEI","key":"WIvMhNUSxG"},{"link":{"mode":0},"title":"Business Enablers","key":"En7t01a32i"},{"link":{"mode":0},"title":"New Initiatives","key":"tVAvyHtmg2"},{"link":{"mode":0},"title":"Retention & Development","key":"91KNtUy91w"},{"link":{"mode":0},"title":"Retail & Restaurant","key":"F36Atmx96k"},{"link":{"mode":0},"title":"Utilities & Distribution","key":"t_jVJNw25l"},{"link":{"mode":0},"title":"Technology","key":"EA015p_rdB"}],"link":{"mode":0},"title":"2022 ACHIEVERS","key":"Xgoc2XXtGK"}],"title":"Benchmark MENU","key":"qvTd3DBOll"},"vbWJCGGmwo":{"title":"pdf","children":[{"link":{"mode":0,"page":"psbWc2vDyc4"},"title":"Security October 2023","key":"Oq5BCHX_TS"},{"link":{"mode":0,"page":"pkYFnV0JOoL"},"title":"AD–DKS","key":"P2sN3mWdsc"},{"link":{"mode":0,"page":"psCrsl1SoLZ"},"title":"Table of Contents","key":"Ot7u6SGzj8"},{"link":{"mode":0,"page":"ph3hWHT8xZ-"},"title":"AD–Security 500","key":"ywvxVDoxJJ"},{"link":{"mode":0,"page":"p0Un1ptPaNV"},"title":"Online Contents","key":"WcLdotXQsx"},{"link":{"mode":0,"page":"pZv7-zzNSwm"},"title":"Security Talk-Column","key":"zlq1ABs6r8"},{"link":{"mode":0,"page":"pyiCHi_3RXD"},"title":"AD–Mission 500","key":"Cg6IKB3bFr"},{"link":{"mode":0,"page":"pA6A7KqP4KF"},"title":"Global News & Analysis-Department","key":"KG0c-hBhTc"},{"link":{"mode":0,"page":"pmNBbUhVfqz"},"title":"AD–Altronix","key":"UvdYwEB6iN"},{"link":{"mode":0,"page":"pdtsTXzV7k2"},"title":"Strategic Security Management-Special Report","key":"eKkb0fBsAc"},{"link":{"mode":0,"page":"pUSxmAYzmov"},"title":"AD–MCA","key":"SfdjUv-OyG"},{"link":{"mode":0,"page":"p8WveKGyZJO"},"title":"Detecting & Managing Fraud-Feature","key":"aq6zZXw6UA"},{"link":{"mode":0,"page":"pjqnARLIdYv"},"title":"AD–Webinar Axis","key":"H0go83-HS9"},{"link":{"mode":0,"page":"paZpOzXFjLT"},"title":"Perimeter Security-Feature","key":"XxFRpQkDzE"},{"link":{"mode":0,"page":"pOCZ798jl3P"},"title":"AD–Amarok","key":"uZ-cmmY400"},{"link":{"mode":0,"page":"pgYyu51DpDu"},"title":"Security Program Design Part 2-Feature","key":"uuJYHR9feO"},{"link":{"mode":0,"page":"pa7NAZPkku9"},"title":"AD–Solutions by Sector","key":"g8kLBk6_D8"},{"link":{"mode":0,"page":"pTJuh0Rd2Sw"},"title":"Career Intelligence-Column","key":"wYw1IhZagm"},{"link":{"mode":0,"page":"pYsrWx1YYeR"},"title":"Leadership & Management-Column","key":"lfJW6NrvNJ"},{"link":{"mode":0,"page":"pb_IsFqwtDI"},"title":"AD–Security Bookstore","key":"frJ4MaVoN-"},{"link":{"mode":0,"page":"ppXUUqUUpJq"},"title":"Cyber Tactics-Column","key":"NRD3E5LYWW"},{"link":{"mode":0,"page":"pvjXdec9SnY"},"title":"AD–Security Renewal","key":"4lyhjJDQYf"},{"link":{"mode":0,"page":"pNWtXEzudgY"},"title":"Education & Training-Column","key":"s2FwOw2OvW"},{"link":{"mode":0,"page":"p6k2_T8fk4E"},"title":"AD–Continuing Education","key":"zoAPkFyCBJ"},{"link":{"mode":0,"page":"p8asxhNC7Js"},"title":"AD–Security eNewsletter","key":"L3B3DRezZk"},{"link":{"mode":0,"page":"pNFsGCQa62K"},"title":"Product Spotlight-Department","key":"3KVWR1Bpdd"},{"link":{"mode":0,"page":"p7XQXvzk8a1"},"title":"AD–Brivo Infocenter","key":"3Lh6mdDnQ_"},{"link":{"mode":0,"page":"po-qAutG259"},"title":"AD–Refer a Friend","key":"coB7Ri6PnC"},{"link":{"mode":0,"page":"pHCw1LUkxdr"},"title":"Classifieds","key":"HYMHTNNA19"},{"link":{"mode":0,"page":"pA6fb3cLaEX"},"title":"Advertising Index","key":"qxO4zI9xJB"},{"link":{"mode":0,"page":"pMELwnu8xCJ"},"title":"Staff Listing","key":"oXZCj4MViB"},{"link":{"mode":0,"page":"pbD0ClsolXt"},"title":"eMagazine Navigation Guide","key":"SWniy0cVqL"}],"key":"vbWJCGGmwo"},"wFFqkY-JfK":{"children":[{"link":{"mode":0},"title":"HOME","key":"d_75yWJoxE"},{"link":{"mode":0},"title":"CONTENTS","key":"v0MVtlR1zP"},{"link":{"mode":0},"title":"AD INDEX","key":"px107ByuRC"}],"title":"MAIN MENU_2023","key":"wFFqkY-JfK"}},"primaryMenu":"fSPzLGr8R5","settings":{"devices":[{"mode":"desktop","columnWidth":[1024,1024],"minMax":true,"canvasSize":[1440,900]},{"mode":"tablet","columnWidth":[600,600],"minMax":true,"canvasSize":[768,1024]},{"mode":"mobile","columnWidth":[320,320],"minMax":true,"canvasSize":[375,667]}]},"masterMode":"desktop"}